Employment

Research Analyst - Security, Risk Management, and Compliance

Enterprise Management Associates

March 2022 - Present

• Cyber Security, Risk Management, and Compliance


Client Solutions Development/Senior Systems Engineer

Federal Contractor

October 2015 – February 2022 (6 years 6 months) Shepherdstown, WV

• Cyber Security Specialist for Federal agency


Senior Security Engineer

Federal Contractor

September 2014 – September 2015 (1 year 1 month) Frederick, MD

• Cyber Security Specialist for Federal agency


Cyber Security Operations Engineer (Senior Consultant)

Federal Contractor

March 2012 – September 2014 (2 years 7 months) Falling Waters, WV

• Cyber Security Specialist for Federal agency


Cyber Security Senior Consultant

Federal Contractor

June 2011 – March 2012 (10 months) Martinsburg, WV

• Cyber Security Specialist for Federal agency


Information Assurance Engineer

Federal Contractor

August 2006 – June 2011 (4 years 11 months) Frederick, MD

Information Assurance Engineer, Frederick, MD

• Information Assurance for Federal defense agency

Education

Bachelor's of Science - Computer Science

Mount Saint Mary's University

Class of 2006

Certifications

CompTIA Security+

CompTIA Advanced Security Practitioner (CASP)

Publications

Death by Identity Theft

  • My very first book - including types of identity theft, impact of identity theft, reducing risk, and what to do if it happens to you

All of my books are available for purchase on this web page.

Social Engineering - You Are a Target

  • One hour long training webinar to help employees identify phishing attempts

The Need for a Cyber Attack Warning System

  • Guest blog post and RFUN 2013 Conference presentation for Recorded Future

Tricks of the Trade – How Malware Authors Cover Their Tracks

  • As security applications evolve to detect more advanced malware, the authors of said malware must adapt and develop new tricks to avoid detection

Voices in the Static – Proactive Cyber Threat Monitoring

  • Proactive threat monitoring is by no means an end-all solution - and security best practices should continue to be followed by your organization. However, adding proactive threat monitoring to your cyber security toolbox, much like checking the weather report, will help your organization prepare for any upcoming “cyber storms”.